Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust

Firms need to acquire a wealth of information about job applicants prior to offering employment. However, the recruitment process in most firms is plagued by rising personal privacy concerns. This article draws upon the socio-cognitive theory of trust to understand the interconnected relationships among technology readiness, disposition to trust HR professionals, institutional-based trust and information privacy-protective response. The conceptual model argues that job applicants’ responses to privacy protection is determined by their trust disposition on HR professionals and social networking sites and personalities toward social technologies. The model was tested with U.S. students using a job recruitment related scenario. The results provide an understanding of how job applicants respond to the privacy issue, and shed some light on the role of technology readiness and trust dispositions. This should help human resource professionals improve the recruitment process for hiring employees with perspectives that are consistent with organizational interest and culture.

[1]  Edward E. Rigdon,et al.  Advanced Structural Equation Modeling: Issues and Techniques , 1998 .

[2]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[3]  Michael Siegrist,et al.  New Information and Social Trust: Asymmetry and Perseverance of Attributions about Hazard Managers , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[5]  Kyesook Han,et al.  Beyond the technology adoption: Technology readiness effects on post-adoption behavior , 2011 .

[6]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[7]  Elin Palm,et al.  Securing privacy at work: the importance of contextualized consent , 2009, Ethics and Information Technology.

[8]  G L Little,et al.  One-Day Dropouts from Correctional Drug Treatment , 1982, Psychological reports.

[9]  Peter A. Rosen,et al.  Social Networking Websites, Personality Ratings, and the Organizational Context: More Than Meets the Eye?1 , 2012 .

[10]  A. Parasuraman,et al.  The impact of technology on the quality-value-loyalty chain: A research agenda , 2000 .

[11]  Donald T. Campbell,et al.  Testing a Single-Factor Model as an Alternative to the Misuse of Partial Correlations in Hypothesis-Testing Research , 1970 .

[12]  Jennifer S. Tucker,et al.  Selection in the Information Age: The Impact of Privacy Concerns and Computer Experience on Applicant Reactions , 2006 .

[13]  Charles N. Greene,et al.  An Evaluation of Causal Models Linking the Received Role with Job Satisfaction. , 1973 .

[14]  Roderick M. Kramer,et al.  Trust and distrust in organizations: emerging perspectives, enduring questions. , 1999, Annual review of psychology.

[15]  Xun William Xu,et al.  Using behavioral modeling technology to capture designer's intent , 2005, Comput. Hum. Behav..

[16]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[17]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[18]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[19]  Lixuan Zhang,et al.  Antecedents and consequences of trust in a social media brand: A cross-cultural study of Twitter , 2013, Comput. Hum. Behav..

[20]  Detmar W. Straub,et al.  An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .

[21]  Peter A. Rosen,et al.  Future employment selection methods: evaluating social networking web sites , 2009 .

[22]  Jeffrey T. Child,et al.  Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory , 2013, Comput. Hum. Behav..

[23]  A. Baier Trust and Antitrust , 1986, Ethics.

[24]  L. A. Hayes,et al.  How Do Technology Readiness, Platform Functionality and Trust Influence C2c User Satisfaction? , 2012 .

[25]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[26]  Jason Bennett Thatcher,et al.  The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website , 2012, IEEE Transactions on Engineering Management.

[27]  Chang-Hyun Jin,et al.  The effects of individual innovativeness on users' adoption of Internet content filtering software and attitudes toward children's Internet use , 2013, Comput. Hum. Behav..

[28]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[29]  Hae Young Lee,et al.  A study of the impact of personal innovativeness on online travel shopping behavior—A case study of Korean travelers , 2007 .

[30]  Zhenhui Jiang,et al.  Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..

[31]  M. Featherman,et al.  Social Word of Mouth: How Trust Develops in the Market , 2014 .

[32]  J. Hair Multivariate data analysis , 1972 .

[33]  Rita Walczuch,et al.  Psychological antecedents of institution-based consumer trust in e-retailing , 2004, Inf. Manag..

[34]  Guido Möllering,et al.  The Nature of Trust: From Georg Simmel to a Theory of Expectation, Interpretation and Suspension , 2001 .

[35]  William P. Smith,et al.  You've been tagged! (Then again, maybe not): Employers and Facebook , 2010 .

[36]  Yair Amichai-Hamburger,et al.  Social network use and personality , 2010, Comput. Hum. Behav..

[37]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[38]  Rino Falcone,et al.  Trust Theory: A Socio-Cognitive and Computational Model , 2010 .

[39]  Jiun-Sheng Chris Lin,et al.  The influence of technology readiness on satisfaction and behavioral intentions toward self-service technologies , 2007, Comput. Hum. Behav..

[40]  I. Ajzen The theory of planned behavior , 1991 .

[41]  Robert G. Capra,et al.  Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..

[42]  H. Raghav Rao,et al.  Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..

[43]  Sandra Streukens,et al.  The effect of service employees' technology readiness on technology acceptance , 2007, Inf. Manag..

[44]  Michael S. Cole,et al.  Recruiters’ Inferences of Applicant Personality Based on Resume Screening: Do Paper People have a Personality? , 2009 .

[45]  R. Kramer,et al.  Trust in Organizations: Frontiers of Theory and Research , 1995 .

[46]  Leigh Anne Clark,et al.  Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .

[47]  H. Harman Modern factor analysis , 1961 .

[48]  Craig Ross,et al.  Personality and motivations associated with Facebook use , 2009, Comput. Hum. Behav..

[49]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[50]  Ana Paula Rocha,et al.  A Socio-cognitive Perspective of Trust , 2013 .

[51]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[52]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[53]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[54]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[55]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[56]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[57]  Yichuan Wang,et al.  Co-Creation in Branding Through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns , 2014, AMCIS.

[58]  Nadine Hennigs,et al.  Determinants of Consumers' Perceived Trust in IT-Ecosystems , 2010, J. Theor. Appl. Electron. Commer. Res..

[59]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[60]  Robert L. Dipboye,et al.  Interviewer Experience and Expertise Effects , 1999 .

[61]  Ralf Caers,et al.  LinkedIn and Facebook in Belgium , 2010 .

[62]  Marshall Scott Poole,et al.  Interpersonal Traits, Complementarity, and Trust in Virtual Collaboration , 2004, J. Manag. Inf. Syst..